CSIAC SME and member of the American Bar Association's Information Security Committee, Richard "Rick" Aldrich, gives a snapshot of the recent developments in cyberlaw, policy, standards, court cases and industry legal frameworks. These slides focus on emerging issues such as cloud data storage, the scope of 3rd-party doctrine, encryption, warrants for
Topic: Artificial Intelligence (AI)
The most valuable resource we have in the universe is intelligence, which is simply information and computation. However, in order to be effective, technological intelligence has to be communicated in a way that helps humans take advantage of the knowledge gained. The optimal way to solve this problem is a combination of human and machine intelligence
As cyberattacks become more refined, they will start mimicking our online traits. This will lead to a battle of the machines.
After less than eight months of development, the algorithms are helping intel analysts exploit drone video over the battlefield.
It's easy to get caught up in the idea that Artificial Intelligence (AI) will be one of two things: our destroyer or our savior. It's time to move beyond this dualistic narrative. The "either or" comparisons create fear or unrealistic expectations, neither of which pragmatically move society forward. Part of shifting this narrative is evolving a new
It is widely accepted that many state and non-state adversaries are approaching technical parity with United States military. This is especially the case where commercial research and development produces militarily useful technologies such as cyber, robotics, and drones. (The Operational Environment and the Changing Character of Future Warfare, 2017) The
In this article we describe how we used the concepts of serious gaming and crowd-sourcing to design, develop and play-test a game to train tactical creativity for staff officers (level 5-6, battalion and brigade) in the RNLA. In the game, trainees solve complex tactical challenges, analyse and discuss them with peers in a structured manner and make
Cyber warfare, cyberterrorism, and cybercrime are serious existential threats to the national security of the United States. This is driving a demand signal for expert cyber operators that is far outpacing the supply. As a result, there is a pressing need to rapidly establish innovative, effective, efficient and responsive cybersecurity education and
Intelligence agencies have a limited number of trained human analysts looking for undeclared nuclear facilities, or secret military sites, hidden among terabytes of satellite images. But the same sort of deep learning artificial intelligence that enables Google and Facebook to automatically filter images of human faces and cats could also prove invaluable in